Vulnerabilities > Critical

DATE CVE VULNERABILITY TITLE RISK
2004-12-31 CVE-2004-2154 Improper Handling of Case Sensitivity vulnerability in multiple products
CUPS before 1.1.21rc1 treats a Location directive in cupsd.conf as case sensitive, which allows attackers to bypass intended ACLs via a printer name containing uppercase or lowercase letters that are different from what is specified in the directive.
network
low complexity
apple canonical CWE-178
critical
9.8
2004-11-23 CVE-2004-0285 Inclusion of Functionality from Untrusted Control Sphere vulnerability in multiple products
PHP remote file inclusion vulnerabilities in include/footer.inc.php in (1) AllMyVisitors, (2) AllMyLinks, and (3) AllMyGuests allow remote attackers to execute arbitrary PHP code via a URL in the _AMVconfig[cfg_serverpath] parameter.
9.8
2004-11-03 CVE-2004-0847 Path Traversal vulnerability in Microsoft Asp.Net 1.0/1.1
The Microsoft .NET forms authentication capability for ASP.NET allows remote attackers to bypass authentication for .aspx files in restricted directories via a request containing a (1) "\" (backslash) or (2) "%5C" (encoded backslash), aka "Path Validation Vulnerability."
network
low complexity
microsoft CWE-22
critical
9.8
2004-10-20 CVE-2004-0772 Double Free vulnerability in multiple products
Double free vulnerabilities in error handling code in krb524d for MIT Kerberos 5 (krb5) 1.2.8 and earlier may allow remote attackers to execute arbitrary code.
network
low complexity
mit openpkg debian CWE-415
critical
9.8
2004-08-04 CVE-2004-1363 Incorrect Calculation of Buffer Size vulnerability in Oracle products
Buffer overflow in extproc in Oracle 10g allows remote attackers to execute arbitrary code via environment variables in the library name, which are expanded after the length check is performed.
network
low complexity
oracle CWE-131
critical
9.8
2004-07-27 CVE-2004-2061 Server-Side Request Forgery (SSRF) vulnerability in Risearch and Risearch PRO
RiSearch 1.0.01 and RiSearch Pro 3.2.06 allows remote attackers to use the show.pl script as an open proxy, or read arbitrary local files, by setting the url parameter to a (1) http://, (2) ftp://, or (3) file:// URL.
network
low complexity
risearch CWE-918
critical
9.8
2004-07-07 CVE-2004-0434 Incorrect Calculation of Buffer Size vulnerability in multiple products
k5admind (kadmind) for Heimdal allows remote attackers to execute arbitrary code via a Kerberos 4 compatibility administration request whose framing length is less than 2, which leads to a heap-based buffer overflow.
network
low complexity
heimdal-project debian CWE-131
critical
9.8
2004-03-03 CVE-2004-0005 Off-by-one Error vulnerability in Gaim Project Gaim 0.75
Multiple buffer overflows in Gaim 0.75 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) octal encoding in yahoo_decode that causes a null byte to be written beyond the buffer, (2) octal encoding in yahoo_decode that causes a pointer to reference memory beyond the terminating null byte, (3) a quoted printable string to the gaim_quotedp_decode MIME decoder that causes a null byte to be written beyond the buffer, and (4) quoted printable encoding in gaim_quotedp_decode that causes a pointer to reference memory beyond the terminating null byte.
network
low complexity
gaim-project CWE-193
critical
9.8
2004-01-20 CVE-2004-0030 Inclusion of Functionality from Untrusted Control Sphere vulnerability in PHPgedview 2.61
PHP remote file inclusion vulnerability in (1) functions.php, (2) authentication_index.php, and (3) config_gedcom.php for PHPGEDVIEW 2.61 allows remote attackers to execute arbitrary PHP code by modifying the PGV_BASE_DIRECTORY parameter to reference a URL on a remote web server that contains the code.
network
low complexity
phpgedview CWE-829
critical
9.8
2003-12-31 CVE-2003-1233 Link Following vulnerability in Pedestalsoftware Integrity Protection Driver 1.3
Pedestal Software Integrity Protection Driver (IPD) 1.3 and earlier allows privileged attackers, such as rootkits, to bypass file access restrictions to the Windows kernel by using the NtCreateSymbolicLinkObject function to create a symbolic link to (1) \Device\PhysicalMemory or (2) to a drive letter using the subst command.
network
low complexity
pedestalsoftware CWE-59
critical
9.8